What It Takes to Be a Winner in Tech

What It Takes to Be a Winner in Tech

Claire Blythe, VP, global tech and operations at GfK (the AI-powered intelligence platform revolutionizing real-time access to critical knowledge), won Role Model of the Year at Computing’s recent Women in Tech Excellence awards. We ask for her secrets to success in technology leadership, and how women can rapidly advance their careers in the field. What does your role encompass? As the VP of global tech and operations for the Marketing and Consumer Intelligence arm of…

Read More

Get 15 hours of basic cybersecurity education online for just $29

Get 15 hours of basic cybersecurity education online for just

This bundle provides a strong overview of the cybersecurity field. Image: Melinda Nagy/Adobe Stock As cybercriminals get savvier and more technical, the demand for data and IT security grows larger. From crypto scams to data breaches and beyond, individuals and companies alike are always looking for ways to protect their precious digital assets. Whether you’re interested in protecting your own digital life or you might want to pursue a new career in cybersecurity, check out…

Read More

Digital Leadership — Outlook and Trends

Digital Leadership — Outlook and Trends

With a career that spans over four decades, Alex Siow is well-known as Singapore’s first Chief Information Officer in the 1990s. He is the author of Leading with IT: Lessons from Singapore’s First CIO, which is written for the next generation of CIOs, CTOs, and other executives who work closely with technology. It offers practical tips, case studies, and personal insights that shed light on the central competencies required of CIOs. Digital Disruption for Business There…

Read More

Cisco CX was All In at Cisco Live 2022

Cisco CX was All In at Cisco Live 2022

Thimaya Subaiya’s keynote address at Cisco Live Last week’s Cisco Live 2022 was incredible! Our time together felt more special than in years past. Not only were we back in person after almost three years with thousands of customers and partners onsite, but we were able to include millions more watching the digital broadcast remotely. From the first keynote to the amazing innovation sessions, you could feel the excitement and energy percolating throughout the event….

Read More

It’s Social Media Day! Here’s How to Protect Yourself From Social Engineering Online | McAfee Blog

It’s Social Media Day! Here’s How to Protect Yourself From Social Engineering Online | McAfee Blog

It’s Social Media Day! How are you celebrating? Reposting your very first profile picture from a decade ago? Sharing your most-loved status update or the photo you’re most proud of? This year, consider commemorating the day by learning more about how to keep your information safe. Enjoy your favorite platform, but be on the lookout for scams, such as social engineering.  What is Social Engineering  Social engineering is a cybercrime common to social media sites….

Read More

Protect your browsing for life with this innovative hardware

Protect your browsing for life with this innovative hardware

The Deeper Connect Mini Decentralized VPN & Firewall Hardware provides reliable and secure network connectivity worldwide. Image: StackCommerce There are many great VPN solutions out there, and given how rampant cyber crime is these days, it’s just smart to utilize one. But most VPNs come with some drawbacks. You have to pay expensive subscription fees, they slow down your browsing and they disconnect easily among a number of other pitfalls. Wouldn’t you like a VPN…

Read More

Data science drives big decisions at Kohl’s

Data science drives big decisions at Kohl’s

Long before the advent of customer data platforms (CDPs), Kohl’s business model centered on collecting and cultivating customer data. “We’ve had a homegrown customer data environment for decades,” says Paul Gaffney, CTO and supply chain officer at the $19.4 billion American department store chain. “And we’re quite happy with our custom implementation.” The Milwaukee, Wis.-based retailer originally built its homegrown on-premises CDP on Netezza, creating robust customer profiles based on the chain’s large credit card…

Read More

The XaaS trap: ‘Everything as a service’ isn’t anything IT really needs

The XaaS trap: ‘Everything as a service’ isn’t anything IT really needs

“Everything as a service” has become quite buzzy in IT over the past few years. The concept, which for some reason bears the acronym XaaS, just means delivering all of IT’s computing services over the internet, charging for and paying per use. How is this different from “cloud”? Beats me. What XaaS really does, however, is put the final nail in the coffin of what was once an important development in IT architecture, turning it…

Read More

Dealing with the Cybersecurity Challenges of Digital Transformation

Dealing with the Cybersecurity Challenges of Digital Transformation

We’re back after a little hiatus with this week’s blog in the series in which I explore the “Top 10 List of the Challenges Cybersecurity Professionals Face,” as found in our Cybersecurity Insights Report 2022: The State of Cyber Resilience. Coming in at number two on our list: Dealing with the speed and complexity of digital transformation. During the COVID-19 crisis, digital transformation became even more critical. To describe digital transformation in economic terms means…

Read More

Info-Stealing Campaign Targeted Home Workers for Two Years

Info-Stealing Campaign Targeted Home Workers for Two Years

Security researchers have uncovered a likely state-sponsored information-stealing operation targeting SOHO workers over the past two years. Coinciding with the shift to mass remote working during the pandemic, the operation was focused on accessing corporate resources via less well-protected home routers, according to Lumen Technologies. It targeted at least scores of SOHO devices from manufacturers including Asus, Cisco, DrayTek and Netgear in mainly North America and Europe. It did this via three key stages: A first-stage…

Read More
1 2,971 2,972 2,973 2,974 2,975 4,169